Inspired eLearning Courses

This course is presented in a simulation-style format that follows two virtual characters as they go about a typical day in the workplace and encounter security incidents along the way. Learners will get a chance to try security awareness best practices by guiding our virtual characters through real-world security situations.

This course is presented in a simulation-style format that follows two virtual characters as they go about a typical day in the workplace and encounter security incidents along the way. Learners will get a chance to practice good security habits by guiding our virtual characters through real-world security situations.

This course is presented in a simulation-style format that follows two virtual characters as they go about a typical day in the workplace and encounter security incidents along the way. Learners will get a chance to practice good security habits by guiding our virtual characters through real-world security situations.

This HTML5-based, iPad-compatible course uses high-quality video and real-world simulations to teach anti-phishing best practices for recognizing and preventing both phishing and spear-phishing attacks.

This course on application security testing covers the general approach used in security assessment (static analysis, dynamic analysis, forensic analysis, penetration testing, and code review) and explains the tools and techniques to identify and follow-up on vulnerabilities discovered during baseline.

*Veracode courses are available as add-ons to our Solutions and Libraries.

Social media is an excellent tool but it also poses unique security, HR, and public relations challenges. This course covers social media best practices including secure use, accountability, harassment, how to spot scams, secure passwords, and advanced security features.

This course is designed to provide fundamental information security knowledge that every employee in the IT Department must have in any organization. This course is easily customized to fit your particular policies, procedures, best practices & guidelines.

Knowing the proper procedures to follow if there is an active shooter in the workplace could mean the difference between life and death. The purpose of this active shooter training course is to familiarize you with basic response practices when encountering an active shooter event, practices that will help you to be prepared for and to respond to a violent emergency.

This anti-harassment training for supervisors course covers advanced harassment topics in depth, such as retaliation and other types of workplace harassment based on sex, race, national origin, religion, sexual orientation, marital status, physical disability, mental disability, medical condition, and other characteristics protected by federal and state law.

This course covers advanced harassment topics in depth, such as retaliation and other types of workplace harassment based on sex, race, national origin, religion, sexual orientation, marital status, physical disability, mental disability, medical condition, and other characteristics protected by federal and state law.

Diversity makes an organization better by empowering it to: Deliver superior customer service, attract and retain talented employees, maximize productivity, maintain its reputation, and serve its community. This course will provide the foundation and background needed to foster a respectful and diverse workplace.

This course targets all employees and covers the importance of an ethical culture, how to make complaints, safeguarding confidential information and intellectual property, gifts and entertainment, improper payments, conflicts of interest, respectful workplace, accurate records, and fraud and abuse.

Our ethics training for supervisors is designed to help managers understand the importance of business ethics, give them the essential tools to identify any unethical conduct or practice that may arise in the workplace, and to effectively correct the problem.

Global business can present new legal and ethical challenges. This anti-bribery and corruption training course is designed to help prepare you for those by explaining anti-corruption laws and our anti-corruption policy, which prohibits bribes and improper payments of any kind.

Compliance with the GDPR will affect all our organization’s data handling activities, either directly or indirectly, and all staff whose responsibilities include use of PII will be expected to operate in accordance with the regulation’s safeguards. This GDPR and data processing course provides a general awareness of the GDPR’s requirements and how they affect our day-to-day data processing activities, as well as helping them to recognize potential problems should they arise.

The General Data Protection Regulation, or GDPR, contains principles for protecting the privacy of EU citizens’ personal data. Upon completion of this module, learners will be able to recognize situations where the GDPR comes into play and what to do when they encounter data that falls under the regulations of the GDPR in the US.

This comprehensive GDPR introduction course is delivered in a series of short, concise modules targeted to specific areas of the law and targeted to defined roles contained within the GDPR. Participants will learn the fundamentals of the new regulations and the key concepts behind them. By the end of this course series, learners will be able to recognize situations where the GDPR comes into play and what to do when they do encounter data that falls under GDPR regulations.

This comprehensive course is delivered in a series of short, concise modules targeted to specific areas of the law and targeted to defined roles contained within the GDPR. Participants will learn the key principles of GDPR, fundamentals of the new regulations, and the important concepts. By the end of this course series, learners will be able to recognize situations where the GDPR comes into play and what to do when they do encounter data that falls under GDPR regulations.

Since data transfers with the US represent a major share of these cross-border activities, this course will focus on a comparison of the differences between EU and US privacy laws, as well as exploring avenues by which EU-US information exchanges can be conducted.

This course is one of a multi-part series that covers the fundamentals of the EU’s General Data Protection Regulation (GDPR) as well as its origins and key concepts. In this module, you learn how the GDPR affects your organization when transferring or receiving EU citizens’ private information outside the borders of the UK and EU.

This HIPAA security training course covers information security awareness topics from the point of view of protecting medical records and all Protected Health Information (PHI). It includes similar topics as those found in S-101 in order to comply with the HIPAA Security Rule.

In this course, you will learn how you can help fight fraud, waste, and abuse in Medicare programs, including, what the major laws are that prohibit abusive practices, how to recognize unlawful activities, how to prevent, correct, and report fraudulent, wasteful, and abusive actions, and where to get help.